CN115694784B - Data security storage method - Google Patents

Data security storage method Download PDF

Info

Publication number
CN115694784B
CN115694784B CN202211701190.0A CN202211701190A CN115694784B CN 115694784 B CN115694784 B CN 115694784B CN 202211701190 A CN202211701190 A CN 202211701190A CN 115694784 B CN115694784 B CN 115694784B
Authority
CN
China
Prior art keywords
base
base matrix
matrix
encrypted
dimensional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211701190.0A
Other languages
Chinese (zh)
Other versions
CN115694784A (en
Inventor
尹浩宇
李光顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang China Commodity City Group Co ltd
Original Assignee
Beijing Houfang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Houfang Technology Co ltd filed Critical Beijing Houfang Technology Co ltd
Priority to CN202211701190.0A priority Critical patent/CN115694784B/en
Publication of CN115694784A publication Critical patent/CN115694784A/en
Application granted granted Critical
Publication of CN115694784B publication Critical patent/CN115694784B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)

Abstract

The invention relates to the field of electronic digital data processing for protecting data, in particular to a data security storage method, which comprises the following steps: converting gray values of all pixel points in a gray image of an image to be encrypted into eight-bit binary codes, converting the binary codes into base codes, and converting the gray image to be encrypted into a plurality of base matrixes; performing chaotic mapping on the chaotic sequence to obtain a key image, and generating a plurality of key two-dimensional base matrixes according to the key image; calculating the preference degree of the base matrix operation rule, and carrying out encryption operation on the base matrix according to the preference degree of the base matrix operation rule and the key two-dimensional base matrix to obtain an encrypted base matrix; performing inverse transformation on the encrypted base matrix to obtain an encrypted gray value; the encrypted image is decrypted according to the optimal operation rule corresponding to the chaotic sequence parameter and the base matrix, the difference between the encrypted image and the image before encryption is larger, the generated encryption matrix has stronger randomness, and the decryption difficulty of the secret key is improved.

Description

Data security storage method
Technical Field
The invention relates to the field of electronic digital data processing for protecting data, in particular to a data security storage method.
Background
With the development of the internet, data stored and transmitted in the network are also increasing exponentially, wherein image data is one of main expression forms of data information, and a large amount of information such as identity information, geographical information and the like is contained in the image data, so that if the information is stolen or destroyed, serious economic loss is easily caused, and national security is seriously threatened. Therefore, for image data containing important information, such as remote sensing images and military training images, it is necessary to encrypt the image data when transmitting or storing the image data.
The traditional image encryption method is usually scrambling and replacing, wherein the scrambling is to scramble positions of pixel points in an image and destroy associated information among the pixel points so as to achieve the aim of encryption, but scrambling encryption only changes the position information of the pixel points, a gray level statistical histogram of the pixel points is not changed, and lawbreakers are likely to break the image through the distribution characteristics of the histogram and steal important information contained in the image; the replacement encryption is to replace gray values of pixel points in an image, so that original gray value information is changed, the purpose of encryption is achieved, and an encryption key for replacement encryption is difficult to manage.
Disclosure of Invention
In order to solve the above problems, the present invention provides a data security storage method, the method comprising:
s1: converting the gray level image to be encrypted into an initial base matrix;
s2, performing chaotic mapping on the gray image to be encrypted to obtain an initial key two-dimensional base matrix; grouping the initial base matrix and the initial key two-dimensional base matrix to respectively obtain a plurality of base matrixes and a plurality of key two-dimensional base matrixes;
s3, calculating the two-dimensional base matrix of each key and the pixel value in the base matrix by using four operation rules respectively to obtain the operation result of each operation rule, and marking the operation rule with the largest difference between the operation result and the pixel value in the gray image to be encrypted as the optimal operation rule of each pixel point; obtaining the preference degree of each operation rule in each base matrix according to the number of pixel points corresponding to each optimal operation rule; obtaining an optimal operation rule of each base matrix according to the preference degree of the operation rule in each base matrix;
s4, calculating each base matrix by adopting the corresponding optimal operation rule and each key two-dimensional base matrix to obtain each encrypted base matrix, splicing all the encrypted base matrixes, then carrying out inverse transformation to obtain an encrypted image of the gray image to be encrypted, and storing chaotic sequence parameters of the encrypted image and the corresponding optimal operation rule of all the base matrixes;
s5: and decrypting the encrypted image according to the stored chaotic sequence parameters and the optimal operation rule corresponding to the base matrix to obtain the gray image to be encrypted before encryption.
Further, the step of converting the gray-scale image to be encrypted into the initial base matrix includes:
converting the gray values of all pixel points in the gray image to be encrypted into binary codes, using a base A to represent 00, a base T to represent 11, a base G to represent 01 and a base C to represent 10, mapping the binary coding sequence into DNA bases to obtain base codes, and converting the gray image to be encrypted into an initial base matrix.
Further, the step of performing chaotic mapping on the gray-scale image to be encrypted to obtain the initial key two-dimensional base matrix comprises the following steps:
according to the chaotic model mapping, a chaotic sequence between [0,1] is obtained, each number in the chaotic sequence between [0,1] is multiplied by 255 and is rounded downwards to obtain a chaotic sequence of [0,255], the chaotic sequence of [0,255] is converted into a two-dimensional matrix with the size of M multiplied by N, the two-dimensional matrix is used as a key image, all values in the two-dimensional matrix are subjected to eight-bit binary conversion, and the eight-bit binary coding is converted into base coding to obtain an initial key two-dimensional base matrix; m and N are the length and width of the gray scale image to be encrypted.
Further, the step of grouping the initial base matrix and the initial key two-dimensional base matrix to obtain a plurality of base matrices and a plurality of key two-dimensional base matrices respectively includes:
extracting the first base of each pixel point in the initial base matrix, and marking the first base of all the pixel points as a group as a first base matrix; extracting the second base of each pixel point in the initial base matrix, and marking the second base of all the pixel points as a group as a second base matrix; extracting the third base of each pixel point in the initial base matrix, and marking the third base of all the pixel points as a group as a third base matrix; extracting the fourth base of each pixel point in the initial base matrix, and marking the fourth base of all the pixel points as a group as a fourth base matrix;
extracting the first base of each pixel point in the initial key two-dimensional base matrix, and marking the first base of all the pixel points as a group as a first key two-dimensional base matrix; extracting the second base of each pixel point in the initial key two-dimensional base matrix, and marking the second bases of all the pixel points as a group as a second key two-dimensional base matrix; extracting the third base of each pixel point in the initial key two-dimensional base matrix, and marking the third base of all the pixel points as a group as a third key two-dimensional base matrix; extracting the fourth base of each pixel point in the initial key two-dimensional base matrix, and marking the fourth base of all the pixel points as a group as a fourth key two-dimensional base matrix.
Further, the step of obtaining the preference degree of each operation rule in each base matrix according to the number of pixel points corresponding to each optimal operation rule includes:
acquisition of the first
Figure 147394DEST_PATH_IMAGE001
The formula of the preference degree of the calculation rule k of the base matrix is as follows:
Figure 108397DEST_PATH_IMAGE002
in the method, in the process of the invention,
Figure 271394DEST_PATH_IMAGE003
the base matrix calculation rule is expressed as
Figure 218621DEST_PATH_IMAGE004
Is the degree of preference of the arithmetic rule of (1), wherein
Figure 393251DEST_PATH_IMAGE004
Is a positive integer and
Figure 649788DEST_PATH_IMAGE004
the maximum value of 4 is taken out,
Figure 50814DEST_PATH_IMAGE005
representing the addition operation of the data processing system,
Figure 660787DEST_PATH_IMAGE006
representing the subtraction operation,
Figure 814557DEST_PATH_IMAGE007
representing an exclusive-or operation,
Figure 117362DEST_PATH_IMAGE008
representing an exclusive nor operation is performed on the data,
Figure 474525DEST_PATH_IMAGE009
the optimal operation rule in the base matrix is expressed as
Figure 888189DEST_PATH_IMAGE004
Is used for the number of occurrences of the pixel,
Figure 162044DEST_PATH_IMAGE010
the number of pixels in the first base matrix is represented.
Further, the step of obtaining the optimal operation rule for each base matrix according to the degree of preference of the operation rule in each base matrix includes:
and marking the operation rule corresponding to the maximum preference degree in each base matrix as the optimal operation rule of each base matrix.
Further, the step of obtaining the gray image to be encrypted before encryption includes:
generating a corresponding chaotic sequence according to the chaotic sequence parameters, converting the chaotic sequence into a two-dimensional matrix with M multiplied by N, performing eight-bit binary conversion on the two-dimensional matrix and the encrypted ciphertext, converting the two-dimensional matrix and the encrypted ciphertext into corresponding base matrixes, decrypting the corresponding base matrixes according to the operation rules of the corresponding base matrixes to obtain decrypted binary numbers, splicing the decrypted binary numbers to obtain corresponding eight-bit binary codes, and converting the eight-bit binary codes into 10 binary numbers to obtain an original gray image to be encrypted; m and N are the length and width of the gray scale image to be encrypted.
The embodiment of the invention has the following beneficial effects:
1. the binary codes of the gray values of the corresponding pixel points are obtained through binary conversion, and the difference between the converted binary codes and the original binary codes is large enough through obtaining the optimal operation rule, so that the effect of increasing the image privacy is achieved.
2. The method has the advantages that through chaotic mapping and the acquisition of the optimal operation rule, key management is simple, the number of coding bits of the key is small, encryption effect is far higher than scrambling encryption, meanwhile, through the acquisition of the optimal operation rule, encryption effect is controllable, the difference between an encrypted image and an image before encryption is as large as possible, meanwhile, the generated encryption matrix is strong in randomness, and the cracking difficulty of the key is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions and advantages of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of steps of a method for securely storing data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating transcoding of a data security storage method according to an embodiment of the present invention;
FIG. 3 is a diagram showing the result of an encoding operation of a data security storage method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of base matrix grouping of a data security storage method according to an embodiment of the present invention.
Detailed Description
In order to further describe the technical means and effects adopted by the present invention to achieve the preset purpose, the following detailed description refers to specific embodiments, structures, features and effects of a data security storage method according to the present invention with reference to the accompanying drawings and preferred embodiments. In the following description, different "one embodiment" or "another embodiment" means that the embodiments are not necessarily the same. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following specifically describes a specific scheme of the data security storage method provided by the invention with reference to the accompanying drawings.
Referring to fig. 1, a flowchart of steps of a method for securely storing data according to an embodiment of the present invention is shown, the method includes the steps of:
s001, converting the image to be encrypted into a gray image, and converting gray values of all pixel points in the image into eight-bit binary codes.
The acquired data are image data containing important information, the image to be encrypted is converted into a gray image, the gray value of a pixel point in the gray image to be encrypted is 0-255, 256 gray levels are added, so that the gray value of the pixel point is binary coded and converted, the gray value is converted into 8-bit binary codes because the gray level interval is 0-255, and the gray value of each pixel point after the binary conversion consists of an eight-bit binary data string. For example: the pixel point with the gray value of 1 is coded by eight-bit binary conversion as follows: 00000001, the encoding of the pixel point with the gray value of 54 after eight-bit binary conversion is as follows: 00110110, the encoding of the pixel point with the gray value of 234 after eight-bit binary conversion is as follows: 11101010. each pixel after the binary conversion is composed of an eight-bit binary data string, and the conversion effect is shown in fig. 2.
S002, converting the binary code into base code, and converting the gray image to be encrypted into an initial base matrix according to the base code.
For an eight-bit binary digit string, the values of the characters in the digit string are only 0 and 1, and 0 and 1 in the binary are considered to be complementary. Four bases are present in human DNA and are also in a complementary state, i.e., adenine (A) and thymine (T) are complementary, and guanine (G) is complementary to cytosine (C). The binary coding sequence is mapped into DNA bases by reference to the complementary rule of DNA. The specific mapping process is as follows: the binary codes are 00 and 11 complementary and 01 and 10 complementary, and the DNA is A and T complementary and G and C complementary, so that A can be used to represent 00, T for 11, G for 01 and C for 10. For example: the pixel with the gray value of 54 is coded by eight-bit binary conversion: 00110110, after conversion by a transcoding method of a 00, t 11, g 01, and c 10, the pixel with a gray value of 54 can be expressed as: after each pixel point performs base coding conversion, the ATGC can convert the image to be encrypted into a base matrix, and this embodiment marks the base matrix as an initial base matrix, and the conversion effect is shown in fig. 2.
S003, performing chaotic mapping according to the chaotic sequence to obtain a key image, and performing binary coding on the key image to generate an initial key two-dimensional base matrix.
A chaotic map is adopted to generate a key image with the same size as the image to be encrypted,
Figure 511117DEST_PATH_IMAGE011
the mapping is a typical chaotic mapping, and the model is as follows:
Figure 745789DEST_PATH_IMAGE012
wherein the method comprises the steps of
Figure 822199DEST_PATH_IMAGE013
As a function of the parameters to be controlled,
Figure 825927DEST_PATH_IMAGE014
the nth number in the chaotic sequence is represented. When coefficient of
Figure 726928DEST_PATH_IMAGE015
When the system enters a chaotic state, the generation of
Figure 448896DEST_PATH_IMAGE016
Chaotic sequence in between, will
Figure 594576DEST_PATH_IMAGE011
Chaotic mapping model iteration
Figure 249548DEST_PATH_IMAGE017
And twice. The chaotic sequence acquired at this time is
Figure 65057DEST_PATH_IMAGE016
The chaos sequence between the two is projected to a value interval of gray values, namely: multiplying each number of the obtained chaotic sequence by
Figure 149688DEST_PATH_IMAGE018
And rounding down to obtain a range of intervals of
Figure 630217DEST_PATH_IMAGE019
Is a chaotic sequence of (a).
At this time, the chaotic sequence is converted into a sequence of the size
Figure 218324DEST_PATH_IMAGE010
The two-dimensional matrix is a key image, the gray value in the key image is converted into eight-bit binary code, and the eight-bit binary code is converted into base code, so that the initial key two-dimensional base matrix is finally obtained. For example: the 1 st number in the generated chaotic sequence is 88, and after binary conversion, the 1 st number is: 01011000, after being converted by the transcoding method of a representing 00, t representing 11, g representing 01, and c representing 10, the pixel point with a gray value of 88 in the generated two-dimensional matrix can be expressed as: GGCA. M and N are the length and width of the gray scale image to be encrypted
S004, calculating the optimization degree of the base matrix operation rule according to the initial key two-dimensional base matrix and the initial base matrix.
The initial base matrix of the original image to be encrypted is grouped.
Since S003 converts the gray value of the pixel point of the image to be encrypted into 4 bases, the image to be encrypted is divided into 4 groups each having
Figure 939155DEST_PATH_IMAGE010
The grouping rules are: extracting the first base of each pixel point in the initial base matrix, and marking the first base of all the pixel points as a group as a first base matrix; extracting the second base of each pixel point in the initial base matrix, wherein the second base of all the pixel points forms a single baseA group, denoted as a second base matrix; extracting the third base of each pixel point in the initial base matrix, and marking the third base of all the pixel points as a group as a third base matrix; the fourth base of each pixel point in the initial base matrix is extracted, the fourth bases of all the pixel points form a group, the group is marked as a fourth base matrix, and the grouping effect is shown in figure 4.
The initial key two-dimensional base matrix is grouped.
Extracting the first base of each pixel point in the initial key two-dimensional base matrix, and marking the first base of all the pixel points as a group as a first key two-dimensional base matrix; extracting the second base of each pixel point in the initial key two-dimensional base matrix, and marking the second bases of all the pixel points as a group as a second key two-dimensional base matrix; extracting the third base of each pixel point in the initial key two-dimensional base matrix, and marking the third base of all the pixel points as a group as a third key two-dimensional base matrix; extracting the fourth base of each pixel point in the initial key two-dimensional base matrix, and marking the fourth base of all the pixel points as a group as a fourth key two-dimensional base matrix.
And calculating the preference degree of the base matrix operation rule.
Will be the first
Figure 760350DEST_PATH_IMAGE001
The first base matrix
Figure 857619DEST_PATH_IMAGE020
Base and first pixel
Figure 831391DEST_PATH_IMAGE001
The first key in the two-dimensional base matrix
Figure 847757DEST_PATH_IMAGE020
The bases of the pixel points are sequentially subjected to addition, subtraction, exclusive OR and exclusive OR operations, binary number operation results are shown in figure 3, and each operation result isConversion to decimal result values
Figure 952986DEST_PATH_IMAGE021
The result of each operation is calculated
Figure 244159DEST_PATH_IMAGE021
And the first image to be encrypted
Figure 665913DEST_PATH_IMAGE020
Comparing the gray values of the pixel points, and marking the corresponding operation rule as the first operation rule when the difference is maximum
Figure 135071DEST_PATH_IMAGE020
The optimal operation rule of each pixel point is that the larger the difference value is, the larger the difference between the gray value of the pixel point corresponding to the ciphertext position and the gray value of the pixel point corresponding to the plaintext position is, so that the information carried by the plaintext is destroyed, and the information contained between the pixel points is destroyed, thereby ensuring the safety of the ciphertext. The rule is prevented from being found from the ciphertext, and the difficulty of ciphertext cracking is increased.
Acquisition of the first
Figure 868541DEST_PATH_IMAGE022
The formula of the preference degree of the calculation rule k of the base matrix is as follows:
Figure 963405DEST_PATH_IMAGE002
in the method, in the process of the invention,
Figure 646190DEST_PATH_IMAGE003
the base matrix calculation rule is expressed as
Figure 519206DEST_PATH_IMAGE004
Is the degree of preference of the arithmetic rule of (1), wherein
Figure 271130DEST_PATH_IMAGE004
Is a positive integer and
Figure 513892DEST_PATH_IMAGE004
the maximum value of 4 is taken out,
Figure 51184DEST_PATH_IMAGE005
representing the addition operation of the data processing system,
Figure 721200DEST_PATH_IMAGE006
representing the subtraction operation,
Figure 225999DEST_PATH_IMAGE007
representing an exclusive-or operation,
Figure 882240DEST_PATH_IMAGE008
representing an exclusive nor operation is performed on the data,
Figure 664251DEST_PATH_IMAGE009
the optimal operation rule in the base matrix is expressed as
Figure 629802DEST_PATH_IMAGE004
Is used for the number of occurrences of the pixel,
Figure 231685DEST_PATH_IMAGE010
the number of pixels in the first base matrix is represented.
Of which the degree of preference
Figure 957195DEST_PATH_IMAGE003
The larger the value of (2) is, the better the ciphertext encryption effect after the two-dimensional base matrix encryption operation is, and the larger the difference between the encrypted image and the original image is, so that the operation rule corresponding to the maximum optimization degree is selected as the first
Figure 452767DEST_PATH_IMAGE001
Optimum operation rule of each base matrix.
The optimal operation rules of the first base matrix, the second base matrix, the third base matrix, and the fourth base matrix are calculated by using this method.
S005, carrying out encryption operation on the base matrix according to the preference degree of the base matrix operation rule and the key two-dimensional base matrix to obtain an encrypted base matrix; and carrying out inverse transformation on the encrypted base matrix to obtain an encrypted ciphertext, and storing the encrypted ciphertext in a memory.
For the first
Figure 464586DEST_PATH_IMAGE001
The base matrix is calculated by adopting an optimal operation rule and a corresponding key two-dimensional base matrix to obtain a corresponding first base matrix
Figure 163551DEST_PATH_IMAGE001
The matrix of encrypted bases, i.e. the first
Figure 551807DEST_PATH_IMAGE001
The first of the encrypted base matrices
Figure 901886DEST_PATH_IMAGE020
The value of each pixel point is
Figure 350185DEST_PATH_IMAGE021
The first encrypted base matrix, the second encrypted base matrix, the third encrypted base matrix and the fourth encrypted base matrix are spliced to form a combined encrypted base matrix, and the splicing method comprises the following steps: the eight-bit binary code is formed according to the reverse process of the 1 step in S004, and the conventional operation for transforming the binary code data according to the base inverse transformation is not described in detail. And carrying out inverse transformation on all bases in the combined encrypted base matrix to form an eight-bit binary code, and carrying out decimal conversion on the eight-bit binary code to obtain an encrypted ciphertext of the gray level image.
The encrypted ciphertext is stored in the memory, and the encryption key is stored in the same way, but it is worth explaining that the storage of the encryption key needs to be encrypted, the encryption method of the encryption key can select the existing AES encryption algorithm to encrypt, and AES encryption is the prior art, and is not summarized in detail here.
S006, reading data from the memory, and decrypting the encrypted image according to the optimal operation rule corresponding to the chaotic sequence parameter and the base matrix.
The key consists of parameters generated by the chaotic sequence and corresponding operation rules, and controllable parameters of the chaotic sequence are as follows:
Figure 802026DEST_PATH_IMAGE023
wherein
Figure 728394DEST_PATH_IMAGE024
The initial value of the generated chaotic sequence is shown, and four groups of base matrixes correspond to four optimal operation rules, so that the key is 6 bits.
It should be noted that: when data is read from the memory, the corresponding encryption key needs to be acquired first, and if the encryption key is stored in the memory together with the ciphertext, the encryption key part is preferably read from the memory, and the corresponding key is acquired by adopting an AES decryption operation.
Generating a corresponding chaotic sequence according to the chaotic sequence parameters, and converting the chaotic sequence into
Figure 198558DEST_PATH_IMAGE010
And (3) performing eight-bit binary conversion on the two-dimensional matrix and the encrypted ciphertext to generate a corresponding base matrix, decrypting through an operation rule of the corresponding base matrix to obtain decrypted binary numbers, and splicing to obtain corresponding eight-bit binary codes, wherein the eight-bit binary codes are converted into 10 binary numbers to obtain an original image to be encrypted.
In summary, the binary coding is performed on the gray value of the gray image pixel point of the image to be encrypted, so that the binary coding and the base coding are converted, the difference between the binary coding after conversion and the original binary coding is large enough by acquiring the optimal operation rule, the effect of increasing the image privacy is achieved, the key management is simple by acquiring the chaotic mapping and the optimal operation rule, the encryption effect is far higher than the scrambling encryption, meanwhile, the encryption effect is controllable by acquiring the optimal operation rule, the difference between the encrypted image and the image before encryption is larger, the generated encryption matrix has stronger randomness, and the cracking difficulty of the key is greatly improved.
It should be noted that: the sequence of the embodiments of the present invention is only for description, and does not represent the advantages and disadvantages of the embodiments. And the foregoing description has been directed to specific embodiments of this specification. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the scope of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (7)

1. A method for securely storing data, the method comprising:
s1: converting the gray level image to be encrypted into an initial base matrix;
s2, performing chaotic mapping on the gray image to be encrypted to obtain an initial key two-dimensional base matrix; grouping the initial base matrix and the initial key two-dimensional base matrix to respectively obtain a plurality of base matrixes and a plurality of key two-dimensional base matrixes;
s3, calculating the two-dimensional base matrix of each key and the pixel value in the base matrix by using four operation rules respectively to obtain the operation result of each operation rule, and marking the operation rule with the largest difference between the operation result and the pixel value in the gray image to be encrypted as the optimal operation rule of each pixel point; obtaining the preference degree of each operation rule in each base matrix according to the number of pixel points corresponding to each optimal operation rule; obtaining an optimal operation rule of each base matrix according to the preference degree of the operation rule in each base matrix;
s4, calculating each base matrix by adopting the corresponding optimal operation rule and each key two-dimensional base matrix to obtain each encrypted base matrix, splicing all the encrypted base matrixes, then carrying out inverse transformation to obtain an encrypted image of the gray image to be encrypted, and storing chaotic sequence parameters of the encrypted image and the corresponding optimal operation rule of all the base matrixes;
s5: and decrypting the encrypted image according to the stored chaotic sequence parameters and the optimal operation rule corresponding to the base matrix to obtain the gray image to be encrypted before encryption.
2. The method for securely storing data according to claim 1, wherein said step of converting the gray-scale image to be encrypted into the initial base matrix comprises:
converting the gray values of all pixel points in the gray image to be encrypted into binary codes, using a base A to represent 00, a base T to represent 11, a base G to represent 01 and a base C to represent 10, mapping the binary coding sequence into DNA bases to obtain base codes, and converting the gray image to be encrypted into an initial base matrix.
3. The method for securely storing data according to claim 1, wherein the step of performing chaotic mapping on the gray-scale image to be encrypted to obtain the initial key two-dimensional base matrix comprises:
according to the chaotic model mapping, a chaotic sequence between [0,1] is obtained, each number in the chaotic sequence between [0,1] is multiplied by 255 and is rounded downwards to obtain a chaotic sequence of [0,255], the chaotic sequence of [0,255] is converted into a two-dimensional matrix with the size of M multiplied by N, the two-dimensional matrix is used as a key image, all values in the two-dimensional matrix are subjected to eight-bit binary conversion, and the eight-bit binary coding is converted into base coding to obtain an initial key two-dimensional base matrix; m and N are the length and width of the gray scale image to be encrypted.
4. The method for securely storing data according to claim 1, wherein the step of grouping the initial base matrix and the initial key two-dimensional base matrix to obtain a plurality of base matrices and a plurality of key two-dimensional base matrices, respectively, comprises:
extracting the first base of each pixel point in the initial base matrix, and marking the first base of all the pixel points as a group as a first base matrix; extracting the second base of each pixel point in the initial base matrix, and marking the second base of all the pixel points as a group as a second base matrix; extracting the third base of each pixel point in the initial base matrix, and marking the third base of all the pixel points as a group as a third base matrix; extracting the fourth base of each pixel point in the initial base matrix, and marking the fourth base of all the pixel points as a group as a fourth base matrix;
extracting the first base of each pixel point in the initial key two-dimensional base matrix, and marking the first base of all the pixel points as a group as a first key two-dimensional base matrix; extracting the second base of each pixel point in the initial key two-dimensional base matrix, and marking the second bases of all the pixel points as a group as a second key two-dimensional base matrix; extracting the third base of each pixel point in the initial key two-dimensional base matrix, and marking the third base of all the pixel points as a group as a third key two-dimensional base matrix; extracting the fourth base of each pixel point in the initial key two-dimensional base matrix, and marking the fourth base of all the pixel points as a group as a fourth key two-dimensional base matrix.
5. The method for securely storing data according to claim 1, wherein the step of obtaining the preference degree of each operation rule in each base matrix according to the number of pixels corresponding to each optimal operation rule comprises:
acquisition of the first
Figure QLYQS_1
The formula of the preference degree of the calculation rule k of the base matrix is as follows:
Figure QLYQS_2
in the method, in the process of the invention,
Figure QLYQS_3
the arithmetic rule of the basic matrix is +.>
Figure QLYQS_7
Is the degree of preference of the arithmetic rule of (1), wherein>
Figure QLYQS_8
Is a positive integer and->
Figure QLYQS_5
Maximum of 4->
Figure QLYQS_10
Representing addition, ∈>
Figure QLYQS_11
Representing subtraction operation +.>
Figure QLYQS_12
Representing exclusive OR operation, ++>
Figure QLYQS_4
Representing the exclusive OR operation, < >>
Figure QLYQS_9
Represents a baseThe optimal operation rule in the base matrix is +.>
Figure QLYQS_13
The number of occurrences of pixels, +.>
Figure QLYQS_14
Indicate->
Figure QLYQS_6
The number of pixels in the matrix of bases.
6. The method of claim 1, wherein the step of obtaining the optimal operation rule for each base matrix according to the degree of preference of the operation rule in each base matrix comprises:
and marking the operation rule corresponding to the maximum preference degree in each base matrix as the optimal operation rule of each base matrix.
7. The method for securely storing data according to claim 1, wherein said step of obtaining a gray-scale image to be encrypted before encryption comprises:
generating a corresponding chaotic sequence according to the chaotic sequence parameters, converting the chaotic sequence into a two-dimensional matrix with M multiplied by N, performing eight-bit binary conversion on the two-dimensional matrix and the encrypted ciphertext, converting the two-dimensional matrix and the encrypted ciphertext into corresponding base matrixes, decrypting the corresponding base matrixes according to the operation rules of the corresponding base matrixes to obtain decrypted binary numbers, splicing the decrypted binary numbers to obtain corresponding eight-bit binary codes, and converting the eight-bit binary codes into 10 binary numbers to obtain an original gray image to be encrypted; m and N are the length and width of the gray scale image to be encrypted.
CN202211701190.0A 2022-12-29 2022-12-29 Data security storage method Active CN115694784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211701190.0A CN115694784B (en) 2022-12-29 2022-12-29 Data security storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211701190.0A CN115694784B (en) 2022-12-29 2022-12-29 Data security storage method

Publications (2)

Publication Number Publication Date
CN115694784A CN115694784A (en) 2023-02-03
CN115694784B true CN115694784B (en) 2023-05-02

Family

ID=85055232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211701190.0A Active CN115694784B (en) 2022-12-29 2022-12-29 Data security storage method

Country Status (1)

Country Link
CN (1) CN115694784B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115861034B (en) * 2023-02-20 2023-06-20 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN116055046B (en) * 2023-03-31 2023-06-09 山东政信大数据科技有限责任公司 Online safe transaction system for agricultural products
CN116260566B (en) * 2023-05-10 2023-07-14 山东爱福地生物股份有限公司 Safe storage method for fertilizer production and processing data
CN117156061B (en) * 2023-08-31 2024-10-11 重庆赛力斯新能源汽车设计院有限公司 Data processing method and device, electronic equipment and storage medium
CN116861468B (en) * 2023-09-04 2023-11-24 苏州宏存芯捷科技有限公司 Design data encryption method for PCB
CN117390712B (en) * 2023-10-31 2024-05-17 深圳沃咔曼科技有限公司 Docking station data security protection method
CN117278325B (en) * 2023-11-17 2024-01-26 临沂大学 Computer network big data safety protection method and system
CN117394984B (en) * 2023-11-28 2024-06-25 安雾信息技术(重庆)有限公司 Sensitive information security protection method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590842A (en) * 2017-09-05 2018-01-16 山东师范大学 Intersect the image encryption method and device of dynamic chaos password based on pixel and DNA
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN111147594A (en) * 2019-12-30 2020-05-12 曲阜师范大学 Internet of things data transmission system, key generation method and data transmission method thereof
CN113129196A (en) * 2021-04-07 2021-07-16 中国人民解放军海军工程大学 Image encryption method based on DNA sequence and memristor chaos
CN113297607A (en) * 2021-06-25 2021-08-24 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6763148B1 (en) * 2000-11-13 2004-07-13 Visual Key, Inc. Image recognition methods

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590842A (en) * 2017-09-05 2018-01-16 山东师范大学 Intersect the image encryption method and device of dynamic chaos password based on pixel and DNA
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN111147594A (en) * 2019-12-30 2020-05-12 曲阜师范大学 Internet of things data transmission system, key generation method and data transmission method thereof
CN113129196A (en) * 2021-04-07 2021-07-16 中国人民解放军海军工程大学 Image encryption method based on DNA sequence and memristor chaos
CN113297607A (en) * 2021-06-25 2021-08-24 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱珍 等.方波曲线耦合零交叉边缘检测的图像加密算法.计算机工程与设计.2018,(第10期),全文. *

Also Published As

Publication number Publication date
CN115694784A (en) 2023-02-03

Similar Documents

Publication Publication Date Title
CN115694784B (en) Data security storage method
CN115242475B (en) Big data safety transmission method and system
CN107220923B (en) Digital picture feedback encryption method based on image network
CN113194213B (en) PNG image information hiding and recovering method based on secret sharing and chaotic mapping
CN116032474B (en) Safety protection system based on big data computer network
CN110535624B (en) Medical image privacy protection method applied to DICOM format
CN115277978B (en) Image information security management method based on state coding table
CN112906043B (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
CN114549266B (en) Image encryption method based on DNA replacement rule and chaotic system
CN116155620B (en) Transaction data secure transmission method for card reader
CN115695675B (en) Video encryption method for network data secure exchange
CN112769545A (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine
CN113114869A (en) Ciphertext domain high-capacity image reversible data hiding method based on MSB prediction
CN114579993A (en) Image encryption method based on quantum key distribution and pixel scrambling
Jangid et al. Hybrid approach of image encryption using DNA cryptography and TF Hill Cipher Algorithm
Almayyahi et al. High-security image steganography technique using XNOR operation and fibonacci algorithm
Swain et al. A dynamic approach to image steganography using the three least significant bits and extended hill cipher
CN115103080B (en) Image encryption method and system based on DNA triploid variation
Jain et al. Adaptive key length based encryption algorithm using DNA approach
CN115834021A (en) Cloud medical image encryption method based on neural network and half tensor product
JP2024536063A (en) Artificial intelligence quantum-resistant encryption method and device
Sanghvi et al. BITSAT: an efficient approach to modern image cryptography
CN110061832B (en) Method for realizing symmetric cipher algorithm using Chinese character as cipher
CN117057804B (en) Financial transaction data secure storage method and system based on hash sequence
KADHIM et al. Hidden encrypted text based on secrete map equation and bioinformatics techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230919

Address after: Ocean Business Building, No. 105 Futian Road, Yiwu City, Jinhua City, Zhejiang Province, 322000

Patentee after: Zhejiang China Commodity City Group Co.,Ltd.

Address before: No. J4, 17/F, No. 1, Zhongguancun Street, Haidian District, Beijing, 100000

Patentee before: Beijing Houfang Technology Co.,Ltd.

TR01 Transfer of patent right